Besides the role of state institutions that come in the forefront of their priorities and obligations to provide security and development of the economy and reduce the unemployment rate and the reduction of inflation and improving education, health and others, the Community Partnership At frames what has become known as the institutions of society civil-with the state does not eliminate the role, but rather complements its role ; it is the role of civil society partner and an extension of the role of the state in the face of challenges and crises, but it may be sometimes a race role in addressing social, political and economic issues of the role played by the state, not complementary.
The highlighting the specificity of the relationship between the youth site within the institutions of civil society and development highlights the importance of the role of these institutions in the rehabilitation of young leaders in various fields, and to raise the sense of national belonging, and the establishment of democracy and respect for human rights values, and then enable the integration into the overall development paths.
على الرغم من تطور الدراسات التاريخية الخاصة بالمرأة بوصفها حقل معرفي مستقل بدأ منذ نهاية الستينيات من القرن الماضي .ونجاج الكاتبات والباحثات في العديد من بلدان الشرق الاوسط وشمال افريقيا في إعادة المرأة الى التاريخ، الا ان الكتابة التاريخية في العراق مازالت تعاني من نقص كبير في الموضوعات التي تناولت حياة النساء في الماضي. وما يزال الباحثات والباحثين ينظرون الى التاريخ على انه سردية للمعارك والحروب ويو
... Show Moreمشكلة البحث :
تعد الادارة الجامعية عاملا مهما واساسيا في اكمال البناء المعرفي لشخصية الطالب الجامعي لما يمثله من قدرة على قيادة العملية التربوية والتعليمية والوصول بها الى تحقيق اهدافها . وطالما كانت هذه الادارة ممثلة ابتداء من رئاسات الاقسام ووصولا الى اعلى الهرم الاداري في الجامعة مهمة في تحقيق الاهداف العلمية والتربوية فان اختيار الاشخاص للقيام بمهامها تاخذ جانبا كبيرا ومهما وذلك للاثر
... Show MoreThis study aims to find out the impact of activities office provided to kindergarten children in the development of creativity in linguistic performance goal of capabilities (fluency, flexibility and originality) through the application of the test configuration Algheih Children Riyadh, which consists of (70) Single to measure the skills of language arts four a listening and speaking and a willingness to read and prepare for writing, was applied (30) Single of language arts, listening and speaking in this research, and was the correlation coefficient for the hearing (0.78) and for speaking was (0.61) has been extracted stability of the scale using the equation Alvakronbach the value of (0.73).
The proper
... Show MoreThe research included an introduction, and three functions
of the Prophet (peace and blessings of Allaah be upon him), a
machine and a companion, and a conclusion , the first function,
which is zakaah, and began with it because it is the basis of every
work, no work is accepted by Allaah except what was sincere to
him, as well as sincere intention, because accepting works is
entrusted with the
The research aims at defining the level of the school environment and the social adjustment of the sample due to the sex and the relation among them. The two researchers have stated the school environment scale counting on the theoretical background and previous studies. As for the social adjustment scale, the researchers have used the scale of (Al-Kindy, 2001) and the school environment scale is implicated on (112) students. The schools and the students were elected in a random way. Whereas the social adjustment scale is implicated on (30) teachers in order to know their ratio of the student's adjustment. The results have appeared the satisfaction of the students on the private school environment within their school aspects (the directo
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More